SCADA Security. Xun Yi

Читать онлайн книгу.

SCADA Security - Xun Yi


Скачать книгу
href="#fb3_img_img_65be4739-8711-5361-8ead-7573b102f438.png" alt="images"/>NNVWCTABLE 4.3 The average reduction rate of distance calculations against E
‐NN

      3 Chapter 5TABLE 5.1 The Separation Accuracy of Inconsistent Observations on DUWWTPTABLE 5.2 The Separation Accuracy of Inconsistent Observations on SimData1TABLE 5.3 The Separation Accuracy of Inconsistent Observations on SimData2TABLE 5.4 The Separation Accuracy of Inconsistent Observations on SIRDTABLE 5.5 The Separation Accuracy of Inconsistent Observations on SORDTABLE 5.6 The Separation Accuracy of Inconsistent Observations on MORDTABLE 5.7 The Separation Accuracy of Inconsistent Observations on MIRDTABLE 5.8 The Detection Accuracy Results of

‐Means in Detecting Consistent/In...TABLE 5.9 The Detection Accuracy Results of
‐Means in Detecting Consistent/Inco...TABLE 5.10 The Detection Accuracy Results of
‐Means in Detecting Consistent/Inc...TABLE 5.11 The Detection Accuracy Results of
‐Means in Detecting Consistent/Inc...TABLE 5.12 The Detection Accuracy Results of
‐Means in Detecting Consistent/Inc...TABLE 5.13 The Detection Accuracy Results of
‐Means in Detecting Consistent/Inc...TABLE 5.14 The Detection Accuracy Results of
‐Means in Detecting Consistent/Incon...TABLE 5.15 The Detection Accuracy of the Proximity‐Detection Rules on DUWWTPTABLE 5.16 The Detection Accuracy of the Proximity‐Detection Rules on SimData...TABLE 5.17 The Detection Accuracy of the Proximity‐Detection Rules on SimData...TABLE 5.18 The Detection Accuracy of the Proximity‐Detection Rules on SIRDTABLE 5.19 The Detection Accuracy of the Proximity‐Detection Rules on SORDTABLE 5.20 The Detection Accuracy of the Proximity‐Detection Rules on MORDTABLE 5.21 The Detection Accuracy of the Proximity‐Detection Rules on MIRDTABLE 5.22 The Illustration of the Acceptable Thresholds
That Produce Signif...

      4 Chapter 6TABLE 6.1 Prediction Results for Decision Models on a Testing Observation

TABLE 6.2 The Separation Accuracy of Inconsistent Observations With/Without G...TABLE 6.3 The Separation Accuracy of Inconsistent Observations With/Without G...TABLE 6.4 The Separation Accuracy of Inconsistent Observations With/Without GATU...TABLE 6.5 The Separation Accuracy of Inconsistent Observations With/Without GATU...TABLE 6.6 The Separation Accuracy of Inconsistent Observations With/Without GATU...TABLE 6.7 The Separation Accuracy of Inconsistent Observations With/Without G...TABLE 6.8 The Separation Accuracy of Inconsistent Observations With/Without GATUD...TABLE 6.9 The Detection Accuracy of the Proximity‐Detection Rules That Have B...TABLE 6.10 The Detection Accuracy of the Proximity‐Detection Rules That Have Bee...TABLE 6.11 The Detection Accuracy of the Proximity‐Detection Rules That Have Bee...TABLE 6.12 The Detection Accuracy of the Proximity‐Detection Rules That Have Bee...TABLE 6.13 The Detection Accuracy of the Proximity‐Detection Rules That Have Bee...TABLE 6.14 The Detection Accuracy of the Proximity‐Detection Rules That Have Bee...TABLE 6.15 The Detection Accuracy of the Proximity‐Detection Rules That Have ...TABLE 6.16 The Acceptable Thresholds
that Produce Significant accuracy resul...TABLE 6.17 The Detection Accuracy of
‐Means Clustering Algorithm With/Without...TABLE 6.18 The Detection Accuracy of
‐Means Clustering Algorithm With/Without G...TABLE 6.19 The Detection Accuracy of
‐Means Clustering Algorithm With/Without G...TABLE 6.20 The Detection Accuracy of
‐Means Clustering Algorithm With/Without G...TABLE 6.21 The Detection Accuracy of
‐Means Clustering Algorithm With/Without G...TABLE 6.22 The Detection Accuracy of
‐Means Clustering Algorithm With/Without G...TABLE 6.23 The Detection Accuracy of
‐Means Clustering Algorithm With/Without...

      5 Chapter 7TABLE 7.1 Performance Comparison of the Camenisch et al. Protocol and the des...

      List of Illustrations

      1 Chapter 1Figure 1.1 SCADA vulnerabilities revealed since 2001 in OSVDB.

      2 Chapter 2Figure 2.1 First‐generation SCADA architecture.Figure 2.2 Second‐generation SCADA architecture.Figure 2.3 Third‐generation SCADA architecture.Figure 2.4 The Modbus frame.

      3 Chapter 3Figure 3.1 SCADAVT Architecture.Figure 3.2 IOModules protocol message structure.Figure 3.3 The protocol message structure of the WaterSystem Server.Figure 3.4 The simulation of a water distribution system.Figure 3.5 SCADA network topology for controlling the scenario of the water ...Figure 3.6 The water levels over a period of time for

and
without contro...Figure 3.7 The water levels over a period of time for
and
with control s...Figure 3.8 The unsuccessful and successful connections and their elapsed tim...Figure 3.9 The effect of DDoS, which targets
, on the water volume of
and...Figure 3.10 The effect of an integrity attack, which targets
, on the water...

      4 Chapter 4Figure 4.1 Clustering of the two first principal components of a sample of t...Figure 4.2 An illustration of the use of the triangle inequality for searchi...Figure 4.3 An investigation of the impact of cluster size, which is influenc...Figure 4.4 The efficiency of the baseline methods and

NNVWC against E
NN in...Figure 4.5 The construction time of the baseline methods and
NNVWC for each...

      5 Chapter 5Figure 5.1 Compromised FEP sends undesired command and falsifies the feedbac...Figure 5.2 Compromised application server sending false information.Figure 5.3 The steps of the SDAD approach.Figure 5.4 The normal operation of the SCADA points

,
,
, Скачать книгу